Sciweavers

526 search results - page 44 / 106
» Adaptive web sites: user studies and simulation
Sort
View
CHI
2007
ACM
16 years 2 months ago
Tracking the interaction of users with ajax applications for usability testing
In this paper, we introduce an implementation for detailed monitoring of user actions on web pages. It addresses the problem that the log data recorded by standard web servers is ...
Richard Atterer, Albrecht Schmidt
USS
2008
15 years 4 months ago
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
Marco Cova, Christopher Kruegel, Giovanni Vigna
HCI
2007
15 years 3 months ago
A Qualitative Oriented Study About IT Procurement Processes: Comparison of 4 European Countries
This study shows that in a qualitative study a small sample size is sufficient to gain interesting results and show differences between the procurement of IT services in different ...
Michael Schiessl, Sabrina Duda
ACSAC
2006
IEEE
15 years 8 months ago
Anomaly Based Web Phishing Page Detection
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Ying Pan, Xuhua Ding
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
15 years 8 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...